Unraveling the LapDogs Network: A New Era of Cyber Espionage
Date: June 27, 2025
Author: Ravie Lakshmanan
Tags: Threat Hunting / Vulnerability
Introduction to the LapDogs Network
Recent findings reveal an alarming trend in the realm of cybersecurity: a network of over 1,000 compromised small office and home office (SOHO) devices has been linked to extensive cyber espionage activities by hacking groups with ties to China. This network, dubbed LapDogs by SecurityScorecard’s STRIKE team, is raising concerns among experts due to its growing reach and sophistication.
Scope of Compromise
The LapDogs network shows a significant concentration of affected devices in the United States and Southeast Asia. The campaign has not only spread to these regions but has also impacted countries like Japan, South Korea, Hong Kong, and Taiwan. The sectors most affected include IT, networking, real estate, and media. Specifically, compromised devices span brands such as Ruckus Wireless, ASUS, Buffalo Technology, Cisco-Linksys, D-Link, Microsoft, Panasonic, and Synology, indicating a wide-ranging breach across notable manufacturers.
The Mechanics Behind LapDogs
At the core of the LapDogs network lies a custom-built backdoor known as ShortLeash. Designed to commandeer infected devices, ShortLeash sets up a deceptive Nginx web server and generates a unique self-signed TLS certificate that falsely presents as being issued by the Los Angeles Police Department. This clever branding tactic is what inspired the nickname for the network.
Delivery and Penetration
ShortLeash mainly infiltrates Linux-based SOHO devices through a shell script, but instances of a Windows version have also been identified. Initial access is executed via N-day security vulnerabilities, specifically targeting flaws like CVE-2015-1548 and CVE-2017-17663. The infiltration process appears to be systematic, with evidence of multiple attacks occurring in batches. The earliest recorded signs of the LapDogs activity date back to September 6, 2023, in Taiwan, followed by another incident on January 19, 2024. To date, a total of 162 distinct intrusion sets have been cataloged.
Similarities and Differences with PolarEdge
The operational framework of LapDogs shares certain traits with another organization called PolarEdge, which was noted for exploiting vulnerabilities in routers and IoT devices. Both networks reportedly use compromised devices, but they exhibit different infection methodologies and persistence tactics.
While PolarEdge often replaces the CGI script of affected devices with a designated web shell, ShortLeash establishes itself within system directories as a .service file, ensuring its persistence even after a reboot. This method allows it to operate with root-level privileges, thereby enhancing its control over the infected devices.
Possible Connections to UAT-5918
There are indications that the China-linked hacking group UAT-5918 might have utilized LapDogs in at least one operation aimed at Taiwan. The exact nature of their involvement remains unclear—whether they are the architects of this network or merely customers of its capabilities.
The Role of ORB Networks in Cyber Operations
Research from Google Mandiant, Sygnia, and SentinelOne highlights a broader trend in which Chinese threat actors are increasingly adopting ORB networks for their operations. Unlike typical botnets, which primarily consist of compromised devices, ORB networks like LapDogs serve a multifaceted role. They can assist throughout the intrusion lifecycle, from reconnaissance and anonymized browsing to netflow collection, vulnerability scanning, and data exfiltration.
Conclusion
As cyber threats evolve, recognizing the capabilities and mechanisms of networks like LapDogs becomes critical for cybersecurity professionals. Understanding these advanced tactics can help in developing comprehensive defense strategies to protect against such cyber espionage efforts in the future.


